| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-prf8-cf2x-rhx7 | fabric-sdk-java has ObjectInputStream.readObject() without ObjectInputFilter, which allows Java deserialization RCE |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hyperledger
Hyperledger fabric |
|
| Vendors & Products |
Hyperledger
Hyperledger fabric |
Thu, 07 May 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hyperledger Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications. From versions 1.0.0 to 2.2.26, Channel.java implements readObject() and exposes deSerializeChannel() which call ObjectInputStream.readObject() on untrusted byte arrays without configuring an ObjectInputFilter. This is a classic Java deserialization RCE pattern. At time of publication, there are no publicly available patches. | |
| Title | ObjectInputStream.readObject() without ObjectInputFilter in fabric-sdk-java allows Java deserialization RCE | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T14:57:52.900Z
Reserved: 2026-04-21T14:15:21.959Z
Link: CVE-2026-41586
Updated: 2026-05-07T14:15:12.122Z
Status : Awaiting Analysis
Published: 2026-05-07T06:16:04.910
Modified: 2026-05-07T16:16:19.727
Link: CVE-2026-41586
No data.
OpenCVE Enrichment
Updated: 2026-05-07T06:30:06Z
Github GHSA